Computer Awareness for Upcoming Exams Set 72

Computer Awareness Questions NIACL Assistant/AO, NICL AO, Dena Bank PO PGDBF, BoB PO, IBPS PO, Bank of India, IBPS Clerk, BOI, and other competitive exams

  1. To navigate to a new web page for which you know the URL, type that URL in the browser’s ……… and press Enter.
    A) Address bar
    B) Domain bar
    C) Address button
    D) Name button
    E) none of these
    View Answer
     Option A
    Explanation:
    Address bar is used to enter the name of desired webpage.
  2. Which protocol does Ping use?
    A) TCP
    B) ARP
    C) ICMP
    D) BOOTP
    E) none of these
    View Answer
     Option C
    Explanation:
    Ping operates by sending Internet Control Message Protocol (ICMP) echo request packets to the target host and waiting for an ICMP echo reply.
  3. ____________tags, placed on animal’s body can be used to record and track in a database all of the animal’s movements.
    A) POS
    B) RFID
    C) PPS
    D) GPS
    E) none of these
    View Answer
     Option B
    Explanation:
    Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by electromagnetic induction from magnetic fields produced near the reader. Some types collect energy from the interrogating radio waves and act as a passive transponder. Other types have a local power source such as a battery and may operate at hundreds of meters from the reader.
  4. “Each packet contains the full source and destination address”. This statement indicates which of the following?
    A) Virtual circuit
    B) Datagram
    C) Data link
    D) FDDI
    E) None of these
    View Answer
     Option B                
    Explanation: Datagram is a self-contained packet of data that carries with it the source and destination information for correct routing. Datagram travels from a source computer to a destination computer via a packet switched network independent of any communication between the two computers.
  5. How will MS-Word respond in repeated word?
    A) A Red wavy line under the repeated word
    B) A Green wavy line under the repeated word
    C) First word with-blue wavy line
    D) A Blue wavy line under the repeated word
    E) First word with red wavy line
    View Answer
     Option A
    Explanation:
    A Red wavy line under the repeated word will be shown by the MS Word.
  6. A computer virus normally attaches itself to another computer program known as ____.
    A) Backdoor program
    B) Target program
    C) Trojan horse
    D) Host program
    E) Bluetooth
    View Answer
     Option C
     Explanation:
    A Trojan horse is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system.
  7. What is MS Access?
    A) OODBMS
    B) ORDBMS
    C) RDBMS
    D) Network Database Model
    E) none of these
    View Answer
     Option B
    Explanation:
    An object-relational database (ORD), or object-relational database management system (ORDBMS), is a database management system (DBMS) similar to a relational database, but with an object-oriented database model: objects, classes and inheritance are directly supported in database schemas and in the query language.
  8. Networking such as LAN, MAN started from which generation of computers?
    A) First generation
    B) Second generation
    C) Third generation
    D) Fourth generation
    E) Fifth generation
    View Answer
     Option D
    Explanation:
    The continued improvement in fourth generation allowed the networking of computers for the sharing of data. Local Area Network(LAN) and Wide Area Network(WAN), were potential benefits, in that they could be implemented in corporations and everybody could share data over it. Then the internet and World Wide Web appeared on the computer scene and fomented the Hi-Tech revolution of 90’s.
  9. Which of the following code used in present day computing was developed by IBM Corporation?
    A) ASCII
    B) Hollerith Code
    C) Baudot Code
    D) EBCDIC Code
    E) None of these
    View Answer
     Option D
    Explanation:
    EBCDIC Code is a binary code for alphabetic and numeric characters that IBM developed for its larger operating systems. It is the code for text files that is used in IBM’s OS/390 operating system for its S/390 servers and that thousands of corporations use for their legacy applications and databases.
  10. ARP (address resolution protocol) is ________.
    A) A TCP/IP protocol used to dynamically bind a high level IP address to a low level physical hardware address
    B) A TCP/IP high level protocols for transferring files from one machine to another
    C) a protocol used to monitor computers
    D) a protocol that handles error and control messages
    E) All of the above
    View Answer
     Option A
    Explanation:
    The address resolution protocol is a protocol used by the Internet Protocol (IP), specifically IPv4, to map IP network addresses to the hardware addresses used by a data link protocol. The protocol operates below the network layer as a part of the interface between the OSI network and OSI link layer.

 

Click here for More Computer Awareness Questions

 

Related posts

6 Thoughts to “Computer Awareness for Upcoming Exams Set 72”

  1. sachin shukla@Target SBI Mains

    ty az plzz post computer aptitude qsn fpr sbi po mains

  2. Trisha

    @Shubhra_AspirantsZone:disqus -6th answer is A or C?

    1. Suraj

      will be c) trojan; typing error

      1. Trisha

        ok thanks:)

  3. What?s Happening i’m new to this, I stumbled upon this I’ve found It absolutely helpful and it has helped me out loads. I hope to contribute & help other users like its aided me. Great job.

Comments are closed.